4.19 out of 5
4.19
8 reviews on Udemy

Algorithms for Cryptography

A short course will run you through the a few of most important cryptographic protocols. PS. this course is in Hindi
Instructor:
Yash Shah
1,552 students enrolled
English [Auto]
Must learn algorithms to start with cryptography
Block Ciphers
Hashing
Message authentication codes

Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix “crypt-” means “hidden” or “vault” — and the suffix “-graphy” stands for “writing.” This short course will run you through the a few of most important cryptographic protocols.

This course will not make you a security expert but it is the first step towards the same.

Learning the inner working of the techniques and the mathematics is what this course focusses on.

Cryptographic algorithms are used for important tasks such as data encryption, authentication, and digital signatures, but one problem has to be solved to enable these algorithms: binding cryptographic keys to machine or user identities. Public key infrastructure (PKI) systems are built to bridge useful identities (email addresses, Domain Name System addresses, etc.) and the cryptographic keys used to authenticate or encrypt data passing among these identities.

Cryptography is everywhere.

It has become an integrated layer of defense within all of the digital transformation initiatives now collectively referred to as digital business. As the foundation of modern security systems, cryptography is used to secure transactions and communications, safeguard personal identifiable information (PII) and other confidential data, authenticate identity, prevent document tampering, and establish trust between servers. Cryptography is one of the most important tools businesses use to secure the systems that hold its most important asset – data – whether it is at-rest or in-motion. Data is vital information in the form of customer PII, employee PII, intellectual property, business plans, and any other confidential information. Therefore, cryptography is critical infrastructure because increasingly the security of sensitive data relies on cryptographical solutions.

Weak or hidden crypto can expose critical infrastructure to vulnerabilities. Public attention to exposed data leads to brand erosion. This modern environment requires organizations to pay attention to how cryptography is being implemented and managed throughout the enterprise.

When wrapped within the invisible layers that form cryptography, sensitive data becomes unreadable and unmodifiable, preventing bad actors from carrying out nefarious activity.

Key Exchange Algorithm

1
Diffie Hellmen Algorithm

Block Cipher

1
Data Encryption Standard (DES)
2
Advanced Encryption Standard (AES)

Hashing and Public Key Cryptography

1
Message Digest 5
2
RSA algorithm with examples

Message Authentication Code

1
Hash Based Message Authentication Code ( HMAC )
2
Cipher Based Message Authentication Code ( CMAC )
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.2
4.2 out of 5
8 Ratings

Detailed Rating

Stars 5
2
Stars 4
4
Stars 3
2
Stars 2
0
Stars 1
0
72b66fad5363de89a8199a84eab53f00
30-Day Money-Back Guarantee

Includes

2 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion